Using the CTE-LDT Encryption Method
If you want to encrypt your data using the live data transformation encryption method, you need to create a Live Data Transformation policy and use that to create your GuardPoints. All encryption will be done in the background while users continue to access the data.
With CTE-LDT, the data will be automatically rekeyed periodically based on the expiration date and the life span of the versioned key used to encrypt the data.
To use the CTE-LDT encryption method:
-
Make sure you have created the required policy components for DFSR as described in Creating Required DFSR Policy Components.
-
If you do not already have a versioned encryption key, create one as described in CTE-Live Data Transformation with Data Security Manager or CTE-Live Data Transformation with CipherTrust Manager.
-
Create the Live Data Transformation policy as described in Creating a CTE-LDT Policy for DFSR.
-
Create the GuardPoints you want to use as described in Creating a CTE-LDT GuardPoint for DFSR.